yaklang/hack-skills
Skill
Installs
hack
50
cors-cross-origin-misconfiguration
49
api-authorization-and-bola
49
ssrf-server-side-request-forgery
49
path-traversal-lfi
49
xss-cross-site-scripting
49
xxe-xml-external-entity
49
injection-checking
49
jwt-oauth-token-attacks
49
cmdi-command-injection
49
business-logic-vuln
49
sqli-sql-injection
49
business-logic-vulnerabilities
49
saml-sso-assertion-attacks
49
api-recon-and-docs
49
api-auth-and-jwt-abuse
49
csrf-cross-site-request-forgery
49
idor-broken-object-authorization
49
oauth-oidc-misconfiguration
49
auth-sec
49
authbypass-authentication-flaws
49
ssti-server-side-template-injection
49
api-sec
49
http-parameter-pollution
48
crlf-injection
48
open-redirect
48
web-cache-deception
48
prototype-pollution
48
race-condition
48
recon-and-methodology
48
file-access-vuln
48
graphql-and-hidden-parameters
48
jndi-injection
48
websocket-security
48
recon-for-sec
48
type-juggling
48
request-smuggling
48
xslt-injection
48
clickjacking
47
insecure-source-code-management
47
deserialization-insecure
47
expression-language-injection
47
csv-formula-injection
47
upload-insecure-files
47
dependency-confusion
46
nosql-injection
45
unauthorized-access-common-services
44
linux-lateral-movement
22
csp-bypass-advanced
21
hash-attack-techniques
21
ai-ml-security
21
kubernetes-pentesting
21
network-protocol-attacks
21
sandbox-escape-techniques
21
linux-security-bypass
21
container-escape-techniques
21
llm-prompt-injection
21
anti-debugging-techniques
21
401-403-bypass-techniques
21
dns-rebinding-attacks
21
waf-bypass-techniques
21
http2-specific-attacks
21
arbitrary-write-to-rce
21
linux-privilege-escalation
21
code-obfuscation-deobfuscation
21
email-header-injection
21
symbolic-execution-tools
21
format-string-exploitation
21
smart-contract-vulnerabilities
21
prototype-pollution-advanced
21
classical-cipher-analysis
21
stack-overflow-and-rop
21
tunneling-and-pivoting
20
vm-and-bytecode-reverse
20
active-directory-acl-abuse
20
ntlm-relay-coercion
20
windows-privilege-escalation
20
binary-protection-bypass
20
defi-attack-patterns
20
android-pentesting-tricks
20
lattice-crypto-attacks
20
steganography-techniques
20
memory-forensics-volatility
20
rsa-attack-techniques
20
mobile-ssl-pinning-bypass
20
kernel-exploitation
20
browser-exploitation-v8
20
subdomain-takeover
20
windows-lateral-movement
20
ios-pentesting-tricks
20
heap-exploitation
20
active-directory-kerberos-attacks
20
windows-av-evasion
20
dangling-markup-injection
20
traffic-analysis-pcap
20
active-directory-certificate-services
20
symmetric-cipher-attacks
20
http-host-header-attacks
20
reverse-shell-techniques
19
macos-process-injection
19
macos-security-bypass
19
hackskills-bugbounty-hunter
1